Computer Network Articles

Page 73 of 122

TCP Client-Server Program to Check if a Given String is a Palindrome

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 2K+ Views

A Palindrome is a word, phrase, or sequence that reads the same backward as forward, such as "madam", "racecar", or "level". This article demonstrates a TCP client-server program where the client sends a string to the server, and the server checks if it's a palindrome and returns the result. How It Works The TCP client-server palindrome checker follows this communication pattern: Connection establishment − The server listens on a specific port, and the client connects to it using TCP sockets. Data transmission − The client uses the send() system call to transmit the ...

Read More

Types of Wireless and Mobile Device Attacks

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 2K+ Views

Wireless and mobile devices face numerous security threats due to their inherent connectivity and portability. Understanding these attack vectors is crucial for implementing effective security measures and protecting sensitive information from malicious actors. SMiShing (SMS Phishing) SMiShing uses Short Message Service (SMS) to deliver fraudulent text messages containing malicious links or requests for sensitive information. Attackers craft convincing messages that appear to come from legitimate sources like banks or service providers. Victims may unknowingly provide credit card numbers, account credentials, or personal information. Clicking malicious links can download malware onto the device, compromising security and potentially creating ...

Read More

Use of Callbacks in Layered Architecture

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Mar-2026 526 Views

A layered architecture organizes software systems into distinct layers, where each layer handles specific functionality and communicates with adjacent layers through well-defined interfaces. This design pattern is fundamental in networking protocols, operating systems, and enterprise applications. Most enterprise applications follow a three-layer architecture consisting of the Presentation layer (user interface), Business layer (application logic), and Persistence layer (data storage). Each layer depends only on the layer below it, creating a clean separation of concerns. What is a Callback? A callback is executable code passed as an argument to other code, with the expectation that it will be ...

Read More

Difference between Bit Rate and Baud Rate

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 11K+ Views

In telecommunication and electronics engineering, Bit Rate and Baud Rate are two commonly used terms in data communication that represent transmission speed but measure different aspects. The Bit Rate is defined as the number of bits (binary 0s and 1s) transmitted over a network per unit time, whereas Baud Rate is defined as the number of signal units or symbol changes transmitted per unit time. The relationship between these terms is given by: Bit Rate = Baud Rate × Number of Bits per Symbol In practice, bit rate is more important for measuring data throughput, while baud ...

Read More

Advantages and Disadvantages of Subnetting

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 6K+ Views

Subnetting is a process of dividing a single physical network into several logical subnetworks (subnets) by borrowing bits from the host portion of an IP address to create multiple smaller networks within a larger network. Subnetting enables organizations to expand their network infrastructure without acquiring additional network numbers from their Internet Service Provider (ISP). It reduces network traffic, improves security, and allows for better network management by creating logical boundaries within the network. Network Subnetting Example Original Network: 192.168.1.0/24 (256 hosts) ...

Read More

Difference between Cache and Cookies in Computer Network

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 962 Views

A cache is a data storage mechanism that allows users to retrieve data or files on computers quickly, while cookies are small text files that web browsers save on users' computers to store preferences and session information. Both cache and cookies are essential components of web browsing that enhance user experience, but they serve different purposes and operate in distinct ways. What is Cache? A cache is a temporary storage layer that stores frequently accessed data to reduce retrieval time and improve performance. Hardware and Software Implementation − Caches exist in both hardware (CPU ...

Read More

Difference between DropBox and BorgBase

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 211 Views

Dropbox and BorgBase are two distinct cloud storage solutions that serve different purposes and target different user bases. Dropbox focuses on file synchronization and sharing across devices, while BorgBase specializes in secure backup storage using the Borg backup system. Dropbox Dropbox is a cloud storage and file synchronization service provided by Dropbox, Inc., an American corporation headquartered in San Francisco, California. Founded in 2007 by Drew Houston and Arash Ferdowsi as MIT students, Dropbox works across all major platforms including Windows, Mac OS, iOS, Android, and web browsers. Dropbox is credited with popularizing the cloud storage concept ...

Read More

What is Advanced Peer-to-Peer Networking (APPN)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 631 Views

A Peer-to-Peer (P2P) network is a distributed computing model where tasks and workloads are shared among interconnected nodes called peers. Unlike traditional client-server architectures, all participants have equal capabilities and responsibilities for data processing and sharing. Advanced Peer-to-Peer Networking (APPN) is a sophisticated networking protocol developed by IBM as part of their Systems Network Architecture (SNA). APPN enables computers to communicate directly with each other without relying on a central server or controlling hardware, providing enhanced flexibility and fault tolerance. APPN Network Architecture Node A ...

Read More

Difference between RIP and OSPF

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 6K+ Views

The Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) are two fundamental routing protocols used in computer networks, but they operate on entirely different principles and are suited for different network environments. Routing Information Protocol (RIP) RIP is one of the oldest distance-vector routing protocols that uses hop count as its primary routing metric. It determines the best path to a destination based solely on the number of routers (hops) a packet must traverse. Maximum hop limit − RIP permits a maximum of 15 hops, which limits the size of networks that can ...

Read More

What is Multiple Spanning Tree Protocol (MSTP)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 16-Mar-2026 2K+ Views

Multiple Spanning Tree Protocol (MSTP) is an advanced Ethernet switching protocol that enables efficient loop prevention across multiple Virtual LANs (VLANs) simultaneously. Unlike traditional STP which creates one spanning tree for all VLANs, MSTP allows different VLANs to use separate spanning tree instances for optimal path utilization. MSTP uses Bridge Protocol Data Units (BPDUs) to communicate tree topology information between switches. It prevents loops by creating a loop-free topology while allowing different VLANs to take different paths through the network, maximizing link utilization and providing load balancing capabilities. MSTP - Multiple Spanning Trees ...

Read More
Showing 721–730 of 1,219 articles
« Prev 1 71 72 73 74 75 122 Next »
Advertisements